fbpx

Your IT Support Experts

We partner with many types of businesses, and strive to eliminate IT issues before they cause expensive downtime.

Home

Stores

About Us

IT Services

Understanding IT

News

Blog

Contact Us

Support

Free Consultation

Interested in seeing what we can do for your business? Contact us to see how we can help you! Sign Up Today

JensenIT Blog

New Cyberattack Targeting Remote Workers

New Cyberattack Targeting Remote Workers

Since the onset of the coronavirus, many businesses have managed to sustain themselves through remote work—also commonly known as telework. While this strategy has allowed quite a few businesses to survive, it has also opened them up to security threats. Here, let’s focus on one such threat: vishing, or voice phishing.

Warnings from Federal Agencies

The issue of voice phishing is currently being pressed by the Federal Bureau of Investigation and the Cybersecurity and Infrastructure Security Agency alike. Vishing is the same as any other phishing attack, just conducted through a voice call instead of an email or other form of message.

These agencies have announced that cybercriminals have begun a vishing campaign, directed toward those that are working from home. By extracting login credentials for corporate networks, these criminals can turn a profit by selling access to other cybercriminals.

The Vishing Strategy

According to the FBI and CISA, cybercrime groups have registered facsimile domains to mimic legitimate company resources before developing phishing sites to live on these fake domains. These domains commonly had a structure like the following:

  • support-[company]
  • ticket [company]
  • employee-[company]
  • [company]-support

If someone were to visit these pages, they would find a page that looked very much like a company’s login page to their virtual private network—so as a result, if someone were to input their credentials, the cybercriminal would then have the means to access the business’ network. These pages can even capture multi-factor authentication measures.

Once these pages are completed, the criminal groups responsible then begin to research a company’s employees to build a profile on them. Names, addresses, phone numbers, workplace titles, and how even how long an employee has even been employed at a company are all included in these dossiers. Then, using random or spoofed VoIP numbers, hackers call these employees and swiftly gain their trust.

Once this trust is acquired, the attacker directs the targeted employee to the spoofed VPN page. Quicker than you can say “social engineering”, the hacker can then access the legitimate account. From there, the attacker is free to do as they please—collecting data on other employees and contacts to take advantage of or extracting other data for financial gain.

With attackers now directing these vishing scams toward remote workers, it is more important than ever that your team understands how they can identify phishing scams

Identifying Scams

  • Be suspicious of unsolicited messages—including calls and voicemails—from those you don’t know. If possible, verify their identity through another means to ensure that they are legitimate.
  • Keep track of the number that any suspected vishing messages come from, as well as the Internet domain you were directed to.
  • Don’t visit a website on a whim after a caller directs you to it, unless you have reason to believe it is legitimate.

For more assistance with your business’ security, reach out to the IT pros at JensenIT. Give us a call at (847) 803-0044 to start a conversation.

Tip of the Week: Getting a Better Wi-Fi Signal at ...
Get Your Business Back on Track
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Monday, September 21, 2020

Captcha Image

Customer Login

Latest Blog

While it may sound strange coming from a managed service provider, there is some wisdom to the adage, “if it ain’t broke, don’t fix it.” We know, we know… it sounds a little hypocritical for us to say something like this, when we spend so much time touting the values of proactive maintenance and similar strategies. However, this now-cliché statement certainly holds water, as exemplified by many modern technologies—including the Boeing 747.

Contact Us

Learn more about what JensenIT can do for your business.

JensenIT
1689 Elk Blvd
Des Plaines, Illinois 60016

Sign up for our Newsletter!

Hey! Before you go, subscribe to our newsletter for IT tech tips and advice!